Spotting Intrusion Scenarios From Firewall Logs Through a Case-Based Reasoning Approach

Lecture Notes in Computer Science - Germany
doi 10.1007/978-3-540-30184-4_17